You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -188,10 +188,9 @@ For more information about using the attack surface reduction rules report, see
188
188
189
189
Attack surface reduction rules now provide the capability to configure rule-specific exclusions, known as "Per Rule Exclusions."
190
190
191
-
> [!NOTE]
192
-
> Per-rule exclusions cannot currently be configured by using PowerShell or Group Policy.
191
+
To configure specific rule exclusions, you have the choices of using the MDE Security Settings Management, Intune, and Group Policy.
193
192
194
-
To configure specific rule exclusions:
193
+
#### Via Intune:
195
194
196
195
1. Open the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), and navigate to **Home** > **Endpoint security** > **Attack surface reduction**.
197
196
@@ -208,6 +207,37 @@ To configure specific rule exclusions:
208
207
> [!TIP]
209
208
> Use the checkboxes next to your list of exclusion entries to select items to **Delete**, **Sort**, **Import**, or **Export**.
210
209
210
+
### Via Group Policy
211
+
212
+
213
+
214
+
Use Group Policy to set the per-user ASR rule exclusions
215
+
216
+
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
217
+
218
+
1. Right-click the Group Policy Object you want to configure, and then select **Edit**.
219
+
220
+
1. In the **Group Policy Management Editor** go to **Computer configuration**.
221
+
222
+
1. Select **Administrative templates**.
223
+
224
+
1. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Microsoft Defender Exploit Guard > Attack Surface Reduction**.
225
+
226
+
1. Double-click **Apply a list of exclusions to specific attack surface reduction (ASR) rules**, and set the option to **Enabled**.
227
+
228
+
1. Then click on **Show...**
229
+
230
+
1. Under "**Value Name**", enter "GUID for the ASR Rule" without the double quotes
231
+
232
+
1. Under "**Value**", enter the <drive_letter:\Path\ProcessName>. In order to add multiple processes, it's separated by a greater than sign (>)
233
+
234
+
e.g. "C:\Notepad.exe>c:\regedit.exe>C:\SomeFolder\test.exe" without the double quotes
235
+
236
+
1. select **OK**. This setting allows the processes that are being blocked by the particular ASR Rule to continue running.
237
+
238
+
> [!NOTE]
239
+
> If the policies are not applying, please review [Troubleshoot Microsoft Defender Antivirus settings](/defender-endpoint/troubleshoot-settings)
240
+
211
241
### Use PowerShell as an alternative method to enable attack surface reduction rules
212
242
213
243
You can use PowerShell - as an alternative to Intune - to enable attack surface reduction rules in audit mode to view a record of apps that would have been blocked if the feature was fully enabled. You can also get an idea of how often the rules fire during normal use.
0 commit comments